default search action
International Journal of Embedded Systems, Volume 7
Volume 7, Number 1, 2015
- Ivan Kolchin, Sergey Filippov:
Bare-metal microhypervisor prototype and measurement of real-time characteristics. 1-10 - Linwei Niu, Gang Quan:
Peripheral-conscious energy-efficient scheduling for weakly hard real-time systems. 11-25 - Guilin Li, Xing Gao, Minghong Liao, Bing Han:
An iterative algorithm to process the top-k query for the wireless sensor networks. 26-33 - Tai Wang, Zongkui Zhou, Tingshao Zhu, Yang Wei:
Mood disorder patients' language features on their microblogs. 34-42 - Mir Sajjad Hussain Talpur, Md. Zakirul Alam Bhuiyan, Guojun Wang:
Shared-node IoT network architecture with ubiquitous homomorphic encryption for healthcare monitoring. 43-54 - Ruhan He, Yongsheng Yu, Jia Chen, Min Li, Xun Yao:
Region covariance tracking with hybrid search strategy. 55-62 - Zhensong Liao, Qiang Yin, Yan Huang, Li Sheng:
Management and application of mobile big data. 63-70 - Chao Wu, Bin Xu, ShanShan Shi, Bin Zhao:
Time-activity pattern observatory from mobile web logs. 71-78 - Li Zhu, Shengyong Xu:
Prediction algorithm based on web mining for multimedia objects in next-generation Digital Earth. 79-87
Volume 7, Number 2, 2015
- Qingling Cai, Yiju Zhan, Jian Yang:
RFID authentication protocol design methodology. 91-103 - Andrej Kos, Urban Sedlar, Mojca Volk, Klemen Peternel, Joze Guna, Aleksander Kovacic, Gregor Burger, Janez Bester, Saso Tomazic, Matevz Pogacnik:
Real-time eHealth visualisation and actuation platform. 104-114 - Qiang Li, Guoyin Zhu, Lixin Miao:
Developing operation layer of logistics information system based on EPCIS. 115-122 - Linghao Zhu, Cheng Wu, Linyin Wu, Junyu Wang, Hao Min:
A DPA-resistant crypto engine for UHF RFID tag. 123-132 - Kamel Messaoudi, El-Bay Bourennane, Salah Toumi, Hichem Mayache, Nawfel Messaoudi, Ouassila Labbani:
Utilisation of the Array-OL specification language for self-generation of a memory controller especially for the H.264/AVC. 133-147 - Ying-hong Dong, Hao Chen, Weining Qian, Aoying Zhou:
Micro-blog social moods and Chinese stock market: the influence of emotional valence and arousal on Shanghai Composite Index volume. 148-155 - Jun Liu, Hongwei Jiang, Xiaoming Liu:
A 3-D robust detail preserving anisotropic diffusion for speckle reduction in 3-D cattle follicle ultrasound image. 156-161 - Qian Xiao, Haitao Xie:
A social tag recommendation method alleviating cold start based on probabilistic graphical model. 162-169 - Tran Van Dung, Ittetsu Taniguchi, Takuji Hieda, Hiroyuki Tomiyama:
Function-level profiling for embedded software with QEMU. 170-179 - Lu Pu, Xiaowei Xu, Han He, Hanqing Zhou, Zhijun Qiu, Yu Hu:
A flexible control study of variable speed limit in connected vehicle systems. 180-188
Volume 7, Numbers 3/4, 2015
- Mengting Li, Xinyi Huang, Joseph K. Liu, Li Xu, Wei Wu:
Cooperative attribute-based access control for enterprise computing system. 191-202 - Zhi-Yi Shao, Bo Yang:
Proof of retrievability with efficient verification. 203-215 - Chengyu Hu, Zuoxia Yu, Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Qixia Yuan:
Weak leakage resilient extractable hash proof system and construction for weak leakage resilient CCA-secure public-key encryption. 216-229 - XiaoBo Chu, Dengguo Feng:
On the provable security of TPM2.0 cryptography APIs. 230-243 - Nan Jiang, Sixin Jin, Tao Wan, Yueshun He:
MVP: modelling virus propagation for IPv6 wireless sensor networks. 244-256 - Fushan Wei, Jianfeng Ma, Chuangui Ma, Xinghua Li:
A two-factor authenticated key exchange protocol based on RSA with dynamic passwords. 257-265 - Jingwei Liu, Qian Li, Rong Sun, Sawand Muhammad Ajmal:
Energy-efficient key agreement protocols for wireless body area networks. 266-279 - Ling Liu, Hanyu Quan, Xuefeng Liu, Yuqing Zhang:
Lightweight handover authentication with location privacy-preserving in mobile wireless networks. 280-288 - Wujun Zhang, Xiaohui Wang, Yunya Zhou, Hua Deng, Yumin Wang:
A GAA-based batch authentication and key agreement for LTE networks. 289-295 - Satria Mandala, Md. Asri Ngadi, Johan Mohamad Sharif, Mohd Soperi Mohd Zahid, Farhan Mohamed:
Investigating severity of blackhole attack and its variance in wireless mobile ad hoc networks. 296-305 - Song Luo:
Anonymous hierarchical identity-based encryption without key delegation in decryption. 306-317 - Junjie Peng, Yuanyuan Chen:
A low energy consumption WSN node. 318-323 - Zhongwen Li, Qian Li, Zhibin Xu, Hai Jiang, Kuan-Ching Li:
A secured transmission model for EPC network. 324-333 - Jingzhao Li, Ren Ping, Ling-Ling Shi, Shunxiang Zhang:
Optimisation of moving target's low-power and high-precision monitoring with RSSI based on static and dynamic clustering. 334-344
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.